We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Towards Efficient Parameterized Synthesis
Khalimov A., Jacobs S., Bloem R.
Verification, Model Checking, and Abstract Interpretation
PARTY: parameterized synthesis of token rings
Khalimov A., Jacobs S., Bloem R.
International Conference on Computer Aided Verification
Evaluation and Assessment of Editable Signatures for Trusted and Reliable Public Sector Data
Stranacher K., Krnjic V., Zwattendorfer B., Zefferer T.
Electronic Journal of e-Government , Vol. 11(2), 2013
Towards a Modular Architecture for Adaptable Signature-Verification Tools
Lenz T., Stranacher K., Zefferer T.
Proceedings of the 9th International Conference on Web Information Systems and Technologies
Effizientes Testen von E-Government Komponenten in der Cloud
Krnjic V., Könighofer P., Zefferer T., Zwattendorfer B.
Arbeitskonferenz DACH Security
Assessment of Redactable Signature Schemes for Trusted and Reliable Public Sector Data
Stranacher K., Krnjic V., Zwattendorfer B., Zefferer T.
Proceedings of the 13th European Conference on e-Government
Middleware Architecture for Cross-Border Identification and Authentication
Zwattendorfer B., Sumelong I., Leitold H.
Journal of Information Assurance and Security , Vol. 8(3), 2013
The INDI Ecosystem of privacy-aware, user-centric Identity
Leontaridis L., Andersson T., Leitold H., Zwattendorfer B., Yang S., Lindholm P.
ISSE 2013 - Securing Electronic Business Processes
The Public Cloud for e-Government
Zwattendorfer B., Tauber A.
International Journal of Distributed Systems and Technologies , Vol. 4(4), 2013
Cross-border certified electronic mailing: A European perspective
Tauber A., Kustor P., Karning B.
Computer Law & Security Review , Vol. 29(1), 2013
Elektronische Identität und Stellvertretung in Österreich
Tauber A., Zwattendorfer B., Stranacher K.
D-A-CH Security 2013
A Secure and Confidential Javascript Crypto-Framework for Cloud Storage Applications
Lenz T., Zwattendorfer B., Tauber A.
IADIS International Conference WWW/INTERNET
Linear Propagation in Efficient Guess-and-Determine Attacks
Eichlseder M., Mendel F., Nad T., Rijmen V., Schläffer M.
International Workshop on Coding and Cryptography
Die physikalische Sicherheit eingebetteter Systeme
Mangard S.
Datenschutz und Datensicherheit, Vol. 36, 2012
Exploiting the Difference of Side-Channel Leakages
Hutter M., Kirschbaum M., Plos T., Schmidt J., Mangard S.
Constructive Side-Channel Analysis and Secure Design - COSADE 2012, 3rd International Workshop, Darmstadt, Germany, May 3-4, 2012, Proceedings.
Localized Electromagnetic Analysis of Cryptographic Implementations
Heyszl J., Mangard S., Heinz B., Stumpf F., Sigl G.
Cryptographers´ Track at the RSA Conference
Parameterized Synthesis
Bloem R., Jacobs S.
Tools and Algorithms for the Construction and Analysis of Systems
Open Source Bausteine als Kooperationsgrundlage
Posch R., Orthacker C., Stranacher K., Tauber A., Zefferer T., Zwattendorfer B.
E-Government - Zwischen Partizipation und Kooperation, Springer, 185-209, 2012
